Elaman company presentation BY Pseudor00t

Page 1

CONFIDENTIIAL

Welcome to Elaman


Company Information ELAMAN is a German based company established in 2004 with its headquarters in Munich/Germany.

CONFIDENTIIAL

Our aim O i iis to provide id comprehensive h i security products and solutions, technical consultancy and services as well ell as professional p ofessio al training t ai i g for fo governments and security agencies.


CONFIDENTIIAL

Elaman GmbH and Gamma Group international The Security Cooperation Setup, Offices and Market


CONFIDENTIIAL

Focus and Setup


CONFIDENTIIAL

Offices Worldwide


CONFIDENTIIAL

Market and References


Portfolio • Communications Monitoring • Special Surveillance Equipment and Solutions (Audio & Video) • TSCM – Counter Surveillance Equipment & Training

CONFIDENTIIAL

• VIP Protection


CONFIDENTIIAL

Communications Monitoring


Commu unication ns Monitoring

CONFIDENTIIAL

• Overview: Communications Monitoring


• Active GSM/UMTS „off air“ M it i S Monitoring Systems, t GSM GSM-Locating L ti & Finding Fi di GSM / GPRS 93 26

89

89 97

36

Handheld DF

39

CONFIDENTIIAL

UMTS •IMSI/IMEI catching •Searching/Scanning & exact Locating •Interception •Blocking •Manipulating

Commu unication ns Monitoring

83


Exact locating of targets via triangulation and silent call

Vehicle DF

Vehicle DF

CONFIDENTIIAL

GSM

Commu unication ns Monitoring

Handheld DF


Commu unication ns Monitoring

CONFIDENTIIAL

Exact locating of targets via triangulation and silent call


Commu unication ns Monitoring

CONFIDENTIIAL

Integration Example


Passive & semi active GSM off air Monitoring Systems GSM Infrastructure Mobile Switching Center (MSC)

Passive (decryption of 5.0 & 5.2)

CONFIDENTIIAL

BTS GSM Target Phone

S i active Semi ti (decryption of 5.0, 5.1 & 5.2)

Commu unication ns Monitoring

PSTN


• Passive Monitoring of Telephone and Trunk Lines

Zebra G Gateway

Remote Capture Unit 1

Switching Centres

Fax Demod Server Modem Demod Server Temp File Storage

Channel Processor Server

Utility Server

NAS Head Server

Utility Server Database Server

Database Storage (CDR)

File Storage

NAS Head Servers

Database Server

Compression Server Application +API Server

Firewall

Remote Capture Unit 2

Zebra Gateway

Master Data Centre

Database Storage (CDR)

Archiving Server

Application +API Ser er Server

Fax Demod Server

Firewall Modem Demod Server Temp File Storage

Channel Processor Server NAS Head Server

Utility Server Database Server

Database Storage (CDR)

CONFIDENTIIAL

Compression Server

Satellite Systems

Application +API Server

Firewall

Administrator

User Workstations

Commu unication ns Monitoring

Architecture


Zebra Functionality

24 U 4000 Ch

Commu unication ns Monitoring

Record all calls and filter Equally suited for TDM and IP networks Extremely high density and high capacity – 512 stereo E1s (1024 E1 inputs) – 300,000 bi-directional channels • Scalable S l bl and d distributable di t ib t bl • CIC mapping

CONFIDENTIIAL

• • •


Portable Monitoring Systems

Commu unication ns Monitoring

CONFIDENTIIAL

Portable Monitoring Center „MC to go“


Commu unication ns Monitoring

CONFIDENTIIAL

Portable IP Monitoring


IP Shaping & Blocking CS2000 A Fully programmable device that’s that s will be connected into IP streams (Ethernet (Ethernet, STM 1, STM4, STM16, etc.) to realize:

CONFIDENTIIAL

•Interception of IP traffic •URL Blocking •Shaping Sh i off VoIP V IP •Blocking of VoIP and Skype

Commu unication ns Monitoring

IP interception, shaping and blocking


Satellite Monitoring •Thuraya y

CONFIDENTIIAL

•Inmarsat


Satellitte Monitoring

CONFIDENTIIAL

Satellite Monitoring, Monitoring Thuraya


CONFIDENTIIAL

Thuraya Coverage map


Satellite Monitoring, Monitoring Thuraya

Strategic Thuraya Monitoring System TMS

Satellitte Monitoring

CONFIDENTIIAL

Marlin Portable Tactical Unit


Satellitte Monitoring

CONFIDENTIIAL

Satellite Monitoring, Monitoring Thuraya


Satellite Monitoring, Thuraya Statistics

Thuraya Activities for one full day (24 hours) taken on 11.12.2007 for nearly all spot beams

CONFIDENTIIAL

Number of calls made from 92 countries


Satellitte Monitoring

CONFIDENTIIAL

Satellite Monitoring, Inmarsat


Typical Inmarsat Monitoring Setup

INMARSAT

6.4GHz UP

1.6GHz UP

1.5GHz DOWN

3.6GHz DOWN

CONFIDENTIIAL

LAND EARTH STATION (LES)

1.5GHz DOWN

INMARSAT MONITORING SYSTEM (IMS)

MOBILE EARTH STATION (MES)

•Extensively or selected interception and recording voice, facsimile and data calls to and from selected terminals terminals. •Voice calls may be monitored in real time, or recovered and played back from the system database. •Facsimile and data calls may generally be displayed with the simple viewer incorporated in the system, or exported. •The generic system is capable of monitoring and recording Inmarsat A, B, C, D, M and mini-M signals, including High Speed Data (HSD) signals used by B and M4 (GAN) terminals

Satellitte Monitoring

3.6GHz DOWN


Radio Frequency Monitoring Systems Tuner -Wide Band Signal Acqisition & Processing -Signal analysis -Automatic detection and classification -Demodulation & Decoding

CONFIDENTIIAL

Antennas

Work Station for COMINT signal analysis

Commu unication ns Monitoring

Broadband Technology


Radio Frequency Monitoring Systems MIRA-System Wideband Analyzer for HF/VHF/UHF

Exemplary workstation configuration comprising of PC, two TFT-displays and an active loudspeaker box.

Commu unication ns Monitoring

CONFIDENTIIAL

Reconnaissance, Recording, Analysis


Signal Analysis / Detection / Classification with Virtual Device Technology

-Demodulation -Decoding

-Time Signal Analysis -Spectrum p Analysis y

CONFIDENTIIAL

-DF-Analysis

Commu unication ns Monitoring

-Classification


Algorithms: -Wattson Watt (HF) -Amplitude Amplitude Corelation (VHF, UHF)

CONFIDENTIIAL

-Interferometer

Commu unication ns Monitoring

Broadband Search and Direction Finding Systems


Commu unication ns Monitoring

CONFIDENTIIAL

Speech Detection


PABX Monitoring Universal communications recording solution for many PABX models like Siemens, Alcatel, Avaya, Mitel, Nortel, NEC, Panasonic, Ericsson, etc.

- Network wide recording of calls, data and fax within PABX and PABX networks - Analog and digital inputs up to 384 channels per unit

- Selectable Data Compression

CONFIDENTIIAL

- Scaleable S platforms f

Commu unication ns Monitoring

- VoIP recording


Computer Monitoring: IT Intrusion The FinFisher IT Intrusion tools for IT interception

Components: •FinFisher USB Suite: - FinFisher HQ (GUI) - FinFisher 1 (USB Dongle) - FinFisher 2 (USB Dongle) - FinFisher 3 (CD)

CONFIDENTIIAL

•FinFisher Remote IT Intrusion Kit (Remote info..) •FinSpy (Professional Trojan Horse) •FinFly F Fl (To (T infect f Target T PC) •FinTraining

Commu unication ns Monitoring

Usage: •Information f G Gathering •PC Surveillance •IT Intrusion •Information Exploitation •Information Interception


Computer Monitoring: IT Intrusion

Commu unication ns Monitoring

CONFIDENTIIAL

FinFisher HQ


Computer Monitoring: IT Intrusion FinFisher 2 (Information Gathering)

Commu unication ns Monitoring

CONFIDENTIIAL

FinFisher 1


Computer Monitoring: IT Intrusion FinFisher 3 2 Bootable CD-Roms: CD Roms: 1. Removes password for selected Windows user account 2. Securely wipes local hard-disks

•Used for remote information gathering •Provides up-to-date IT Intrusion environment (e.g. WLAN, Bluetooth, etc.) •FinTrack operating system

CONFIDENTIIAL

•All major up-to-date IT Intrusion tools

Commu unication ns Monitoring

FinFisher s e Remote e ote IT Intrusion t us o Kitt


Computer Monitoring: IT Intrusion FinSpy

Features: – Custom Executables – Bypasses Anti-Virus/Anti-Spyware Anti Virus/Anti Spyware Software – Location Tracing – Scheduled Operations – Key K Logging L i – Password Gathering – Webcam/Microphone Access – Communication C i i Sniffing: S iffi • Skype • Instant Messengers (ICQ, Yahoo, …) – Other

Commu unication ns Monitoring

CONFIDENTIIAL

•Professional Trojan Horse •Monitor and remotely access one or multiple systems •All communication is hidden and enciphered


Computer Monitoring: IT Intrusion FinFly

Trainings T i i •FinTraining: Basic IT Intrusion Courses •FinTraining Advanced: Exploiting Software •FinTraining Fi T i i Advanced: Ad d R Rootkits ki •FinTraining Advanced: IT Intrusion VoIP •FinTraining Advanced: Wireless IT Intrusion •FinTraining Advanced: Covert Comms

Commu unication ns Monitoring

CONFIDENTIIAL

•Used to infect executables while downloading •Components: – Transparent HTTP Proxy – EXE Loader •Proxy attaches Trojan Horse software to downloaded executables on-the-fly •ISP Version to come in 2008 •Etc. •Etc


Link Analysis

Search for hidden relationships and non-trivial communication patterns

A

C B

T hidden middleman „M“

E

M

33

R

D

CONFIDENTIIAL

... Calling partner ... Monitored subscriber ... Individual groups of suspects Link Analysis

S

Commu unication ns Monitoring

40


Commu unication ns Monitoring

CONFIDENTIIAL

Link Analysis

Link Analysis


Jammer Systems Counter Surveillance Encr ption Encryption Detection IT Security & Forensic Lockpicking & Silent Drilling Tracking Surveillance Vehicles Recorders CONFIDENTIIAL

VIP Protection Audio Surveillance


• Jammer Systems (Low Power)

Counter Surveillance Jammer (20Mhz-2,4Ghz)

Low power room GSM jammer, jammer (900/1800 Mhz)

Jamme er System ms

CONFIDENTIIAL

Medium Power GSM Room Jammer


• Jammer Systems (High Power)

Remote Controll Unit Vehicle Installation External View

Wide Band Jammer 25-2500 Mhz 100 Watts programmable

CONFIDENTIIAL

U Vehicle Unit V h l Installation I ll

Mission Editor (GUI on PC)

Antennas


• Jammer Systems (High Power)

VIP Protection High Power Convoy Jammer

Jamme er System ms

CONFIDENTIIAL

(20Mhz- 6 GHz) 250 Watts


• Counter Surveillance TSCM

Counte er Surveillance

CONFIDENTIIAL

The Threat


• Encryption

CONFIDENTIIAL

PSTN, GSM, Fax, E1, Email, Harddisc

Encrypttion

SW + HW – based encryption solutions


Detectiion Syste ems

CONFIDENTIIAL

• Detection Systems X-Ray


• Detection Systems CBRN Detection

Handheld for Explosives, Chemicals and narcotics Document Scanner

CONFIDENTIIAL

Explosive and Narcotics Scanner

Scanner for Explosives, and dN Narcotics ti Walk Through Detection


• Lock Picking

CONFIDENTIIAL

Car Opening Tools

Stethoscope

Decoder for certain Locks

Lock Picking Sets

Auto Dialer for Combination Locks

Lock Picking & Silent D Drilling

C Covert Methods M h d off Entry E


• Silent Drilling

CONFIDENTIIAL

Manual Low Noise Drilling Kit

Low Noise Drilling System

Automatic Covert Low Noise Drilling Kit


• Tracking Systens GPS/GSM/GPRS

Box

With Google Earth Maps

Tracking

CONFIDENTIIAL

Board


Recorders

CONFIDENTIIAL

• Minaturized Recorders (Audio and Video)


• Miniaturized Audio Surveillance

Audio S Surveilla ance

CONFIDENTIIAL

Wireless & wired, analogue/digital, remote controlled, encrypted


Video S Surveilla ance

CONFIDENTIIAL

• Miniaturized Video Surveillance


• Audio & Video Filtration Systems

Video Enhancement Laboratory

CONFIDENTIIAL

Audio Processing Laboratory


• Surveillance Vehicles - Mobile Surveillance Platforms integrating command, communication and surveillance - Audio and Video Surveillance - Communication systems (GSM, SAT, Trunk Radio, etc.), specialist covered antennas - AC and heating Systems - GSM Monitoring Units (Active and passive) - Tracking Systems

CONFIDENTIIAL

- Remote Control Car Systems


Surveillance Ve ehicles

CONFIDENTIIAL

• Surveillance Vehicles


• Training Training services form an important and often integral part of implementing successful security operations. A major factor in our philosophy is the belief that training and the understanding of products and technology are critical factors and major strengths in finding successful security solutions.

CONFIDENTIIAL

Elaman highly trained personnel are called upon by many government security organisations to give advice and consultation. consultation Elaman have organised and developed a highly successful training programme designed to benefit government security personnel at many levels not only for operational techniques but also important stages of maintenance.


CONFIDENTIIAL

• Typical Training Courses •

Management Training

Operational Training

Technical Training

Covert Concealment

TSCM Basic & Advanced

Document Opening

Lock Picking - Basic & Advanced

Covert Methods of Entry

Insertion Techniques

Video & Photographic Surveillance

Audio Surveillance

Intelligence Data Base

VIP Close Protection


ELAMAN works closely with clients to develop a total system solution to their needs and to ensure that they are equipped, a ed aand d manned a ed to o meet ee the e formidable o dab e cchallenges a e ges in the e field ed trained of communication. If you would like further Information about ELAMAN, or would like to discuss di a specific ifi requirement i or project, j please l contact us at:

CONFIDENTIIAL

Elaman GmbH G German S Security i Solutions S l i Seitzstr. 23 80538 Munich Germany T l +49-89-24 Tel: 49 89 24 20 91 80 Fax: +49-89-24 20 91 81 info@elaman.de www.elaman.de

Thank You.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.